source-address prefix;
source-address-range (Services NAT) lowminimum-value high maximum-value <except>;
}
To configure traditional NAT, you can use the destination address, a range of destination
addresses, the source address, or a range of source addresses as a match condition, in
the same way as you would configure a firewall filter; for more information, see the
Routing Policies, Firewall Filters, and Traffic Policers Feature Guide.
Alternatively, you can specify a list of source or destination prefixes by including the
prefix-list statement at the [edit policy-options] hierarchy level and then including either
the destination-prefix-list or the source-prefix-list statement in the NAT rule.
Configuring Actions in NAT Rules
To configure NAT actions, include the then statement at the [edit services nat rule
rule-name term term-name] hierarchy level:
[edit services nat rule rule-name term term-name]
then (Services NAT) {
no-translation;
syslog (Services NAT) ;
translated {
source-pool nat-pool-name;
source-prefix (Services NAT) source-prefix;
translation-type {
napt-44;
}
}
}
The no-translation statement enables you to specify addresses that you want excluded
from NAT.
The syslog statement enables you to record an alert in the system logging facility.
Configuring Translation Types
The translation-type statement specifies the type of NAT used for source or destination
traffic. ACX Series routers support only napt-44 NAT type. The napt-44 option implements
dynamic translation of source IP addresses with port mapping. You must specify a name
for the source-pool statement. The referenced pool must include a port configuration. If
a port range is specified, then it implies that Network Address Port Translation (NAPT)
is used.
Copyright © 2017, Juniper Networks, Inc.1006
ACX Series Universal Access Router Configuration Guide